Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-9398

Опубликовано: 01 окт. 2024
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

By checking the result of calls to window.open with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.

The Mozilla Foundation's Security Advisory: By checking the result of calls to window.open with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7thunderbirdOut of support scope
Red Hat Enterprise Linux 9firefoxAffected
Red Hat Enterprise Linux 9firefox-flatpak-containerAffected
Red Hat Enterprise Linux 9thunderbird-flatpak-containerAffected
Red Hat Enterprise Linux 7 Extended Lifecycle SupportfirefoxFixedRHSA-2024:770207.10.2024
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2024:769907.10.2024
Red Hat Enterprise Linux 8firefoxFixedRHSA-2024:770007.10.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2024:764603.10.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-203
https://bugzilla.redhat.com/show_bug.cgi?id=2315952firefox: thunderbird: External protocol handlers could be enumerated via popups

EPSS

Процентиль: 72%
0.00737
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
9 месяцев назад

By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.

CVSS3: 5.3
nvd
9 месяцев назад

By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.

CVSS3: 5.3
debian
9 месяцев назад

By checking the result of calls to `window.open` with specifically set ...

CVSS3: 5.3
github
9 месяцев назад

By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.

CVSS3: 5.3
fstec
9 месяцев назад

Уязвимость функции Window.open() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 72%
0.00737
Низкий

4.3 Medium

CVSS3